Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pdr/addressing review comments #83

Draft
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

philippederyck
Copy link
Contributor

Addressing review comments and improvements

Added clarification on session hijacking and session fixation.

This resolves oauth-wg#82
Added an initial explanation to clarify the type of application within scope.

This resolves oauth-wg#78
Clarified that we only focus on OAuth and not on other consequences (which are more broad and apply to all types of JS applications, regardless of OAuth).

Hope this suffices, especially because the attack scenarios are clearly marked as non-exhaustive. The consequences are pretty well-defined and scoped, so I think this should work.
Added a section on the risks in the proxy component

This resolves oauth-wg#81
This addresses the CSP comment of oauth-wg#73
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

mention malicious javascript as the foundation of the threat analysis early in the document
1 participant